Web Security Flashcards

1
Q

Security by Obscurity

A

DUMB AF

“Nobody knows the URLs of our API, so it’s safe”- some dumbass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What to use instead of HTTP

A

HTTPS! uses secure TLS connection (encrypted)

Harder to access the requests/responses

Not impossible though

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication vs Authorisation

A

Authentication: Confirming the identity of someone

Authorisation: Verifying that you are permitted to do what you want to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How ot Authenticate/Authorize

A
HTTP Basic Authentication
Session IDs
Tokens
OAuth (2.0) Authorisation
Signed Requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTP Basic Authentication

A

User and password authentication sent via HTTP headers… clear text.

User and password sent in each request
-Possible to steal

After first login use session IDs or tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session IDs

A

After user is authenticated. set a cookie to provide the server with information about the client, server remembers rights, data, transactions etc)

Stateful (conflicts with REST)

Can be guessed/stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tokens

A

Data that is used instead of credentials (user/pw)
-credentials not sent back and forth all the time

Bearer token: anyone who “bears” it has access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OAuth 2.0

A

Login with some other account… google or fb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Request Signing

A

Create secure hash of the entire request

send request and hash to the server

server creates hash using your secret(only you and the server know it) and compares to your hash

vulnerable to Replay attack
-fix with including date in the request

Secret is often sent with other mediums…email sms etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerability

A

weakness of an asset or group of assets which can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat

A

capabilities, intentions and attack methods of adversaries or any circumstance or event that has the potential to cause harm to info or system… or cause these to harm others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exploit

A

defined way to breach the security of an information system through vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OWASP top 10

A
  1. Injection
  2. Broken Authentication
  3. Sensitive Data Exposure
  4. XML External Entities
  5. Broken Access Control
  6. Security Misconfiguration
  7. Cross-Site Scripting
  8. Insecure Deserialisation
  9. Using Components with known vulnerabilities
  10. Insufficient logging and monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Injection

A

When untrusted data is sent to an interpreter as part of a command or query. Tricking the interpreter to execute unintended commands or accessing data without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Broken Authentication

A

Username/pw re-use
Weak passwords
Re-use of session IDs no proper invalidation of session IDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sensitive Data Exposure

A

Cleartext transfer
Data stored in cleartext on database
weak algorithms

17
Q

Broken access control

A

Security by obscurity

Modifying URLs and parameters/request body to maybe get access

18
Q

Security misconfiguration

A

Unnecessary features enabled

standard accounts/pw still existing

returning full stack traces to user

19
Q

Cross site scripting

A

User input directly displayed withoud escaping/sanitasing

20
Q

Using components with known vulerabilities

A

Ill update later
Nested dependencies
irregular scans for vulnerabilities

21
Q

Insufficient logging and monitoring

A

No logging

Not enough loggin

Only local loggin

Maby you wont even know about the attack!